2,969
Views
4
CrossRef citations to date
0
Altmetric
Original Articles

Digital accumulation behaviours and information management in the workplace: exploring the tensions between digital data hoarding, organisational culture and policy

, , &
Pages 1206-1218 | Received 10 Jun 2021, Accepted 11 Apr 2023, Published online: 05 May 2023

References

  • Alon, L., and R. Nachmias. 2020. “Gaps Between Actual and Ideal Personal Information Management Behavior.” Computers in Human Behavior 107: 1–107. doi:10.1016/j.chb.2020.106292.
  • Ammari, T., S. You, and L. P. Robert Jr. 2018. “Alternative Group Technologies and Their Influence on Group Technology Acceptance.” American Journal of Information Systems 6 (2): 29–37. Doi: 10.12691/ajis-6-2-1.
  • Beautement, A., I. Becker, S. Parkin, K. Krol, and M. A. Sasse. 2016, June. “Productive Security: A Scalable Methodology for Analysing Employee Security Behaviours.” 12th symposium on usable privacy and security (SOUPS), pp. 253–270.
  • Beautement, A., M. A. Sasse, and M. Wonham. 2008. “The Compliance Budget: Managing Security Behaviour in Organisations.” Proceedings of the 2008 New security paradigms workshop, pp. 47–58.
  • Bergman, O., R. Beyth-Marom, and R. Nachmias. 2003. “The User-Subjective Approach to Personal Information Management Systems.” Journal of the American Society for Information Science and Technology 54 (9): 872–878. doi:10.1002/asi.10283
  • Bergman, O., T. Israeli, and S. Whittaker. 2020. “The Scalability of Different File-Sharing Methods.” Journal of the Association for Information Science and Technology 71 (12): 1424–1438. doi:10.1002/asi.24350
  • Blythe, J. M., L. Coventry, and L. Little. 2015. “Unpacking Security Policy Compliance: The Motivators and Barriers of Employees’ Security Behaviors.” Eleventh symposium on usable privacy and security, pp. 103–122.
  • Branley-Bell, D., L. Coventry, E. Sillence, S. Magalini, P. Mari, A. Magkanaraki, and A. Kalliopi. 2020. Your hospital needs you: Eliciting positive cybersecurity behaviours from healthcare staff using the AIDE approach. Annals of Disaster Risk Sciences.
  • Braun, V., and V. Clarke. 2006. “Using Thematic Analysis in Psychology.” Qualitative Research in Psychology 3 (2): 77–101. doi:10.1191/1478088706qp063oa
  • Bulgurcu, B., H. Cavusoglu, and I. Benbasat. 2010. “Information Security Policy Compliance: An Empirical Study of Rationality-Based Beliefs and Information Security Awareness.” MIS Quarterly 34 (3): 523–548. doi:10.2307/25750690
  • Coventry, L., and D. Branley. 2018. “Cybersecurity in Healthcare: A Narrative Review of Trends, Threats and Ways Forward.” Maturitas 113: 48–52. doi:10.1016/j.maturitas.2018.04.008.
  • Da Veiga, A., L. V. Astakhova, A. Botha, and M. Herselman. 2020. “Defining Organisational Information Security Culture—Perspectives from Academia and Industry.” Computers & Security 92:101713. doi:10.1016/j.cose.2020.101713.
  • Dinneen, J. D., and M. Krtalić. 2020. “E-mail as Legacy: Managing and Preserving e-Mail as a Collection.” Portal: Libraries and the Academy 20 (3): 413–424. doi:10.1353/pla.2020.0022
  • Glaspie, H. W., and W. Karwowski. 2017, July. “Human Factors in Information Security Culture: A Literature Review.” International conference on applied human factors and ergonomics, pp. 269–280. Springer, Cham.
  • Guest, G., E. Namey, and K. McKenna. 2017. “How Many Focus Groups are Enough? Building an Evidence Base for Nonprobability Sample Sizes.” Field Methods 29 (1): 3–22. doi:10.1177/1525822X16639015
  • Gwizdka, J. 2001. “Supporting Prospective Information in Email.” CHI ‘01 extended abstracts on human factors in computing systems (CHI EA ‘01). ACM, New York, NY, USA, 135–136. doi:10.1145/634067.634150
  • Gwizdka, J. 2002. “Reinventing the Inbox: Supporting the Management of Pending Tasks in Email.” CHI ‘02 extended abstracts on human factors in computing systems (CHI EA ‘02).
  • Hargittai, E., and E. Litt. 2013. “New Strategies for Employment? Internet Skills and Online Privacy Practices During People's job Search.” IEEE Security & Privacy 11 (3): 38–45. doi:10.1109/MSP.2013.64
  • Herath, T., and H. R. Rao. 2009. “Protection Motivation and Deterrence: A Framework for Security Policy Compliance in Organisations.” European Journal of Information Systems 18 (2): 106–125. doi:10.1057/ejis.2009.6
  • Holten, A.-L., G. Robert Hancock, R. Persson, Å Marie Hansen, and A. Høgh. 2016. “Knowledge Hoarding: Antecedent or Consequent of Negative Acts? The Mediating Role of Trust and Justice.” Journal of Knowledge Management 20 (2): 215–229. doi:10.1108/JKM-06-2015-0222.
  • Ifinedo, P. 2009. “Information Technology Security Management Concerns in Global Financial Services Institutions: Is National Culture a Differentiator?” Information Management & Computer Security 17 (5): 372–387. doi:10.1108/09685220911006678
  • Ifinedo, P. 2012. “Understanding Information Systems Security Policy Compliance: An Integration of the Theory of Planned Behavior and the Protection Motivation Theory.” Computers & Security 31 (1): 83–95. doi:10.1016/j.cose.2011.10.007
  • Information Commissioners Office. 2018. Guide to General Data Protection Regulation. https://www.gov.uk/government/publications/guide-to-the-general-data-protection-regulation.
  • Kirlappos, I., A. Beautement, and M. A. Sasse. 2013, April. ““Comply or Die” Is Dead: Long Live Security-Aware Principal Agents.” International conference on financial cryptography and data security, pp. 70–82. Springer, Berlin, Heidelberg.
  • Korzaan, M. L., and K. T. Boswell. 2008. “The Influence of Personality Traits and Information Privacy Concerns on Behavioural Intentions.” Journal of Computer Information Systems 48: 15–24. doi:epdf/10.1080.
  • Luxon, A. M., C. E. Hamilton, S. Bates, and G. S. Chasson. 2019. “Pinning our Possessions: Associations Between Digital Hoarding and Symptoms of Hoarding Disorder.” Journal of Obsessive-Compulsive and Related Disorders 21: 60–68. doi:10.1016/j.jocrd.2018.12.007
  • McKellar, K., E. Sillence, N. Neave, and P. Briggs. 2020. “There is More Than one Type of Hoarder: Collecting, Managing and Hoarding Digital Data in the Workplace.” Interacting with Computers 32 (1): 209–220. doi:10.1093/iwc/iwaa015
  • Michie, S., L. Atkins, and R. West. 2014. The Behaviour Change Wheel: A Guide to Designing Interventions. London, UK: Silverback Publishing.
  • Neave, N., P. Briggs, K. McKellar, and E. Sillence. 2019. “Digital Hoarding Behaviors: Measurement and Evaluation.” Computers in Human Behavior 96: 72–77. doi:10.1016/j.chb.2019.01.037
  • Nurse, J. R. C., O. Buckley, P. A. Legg, M. Goldsmith, S. Creese, G. R. T. Wright, and M. Whitty. 2014. “Understanding Insider Threat: A Framework for Characterising Attacks.” IEEE Security and Privacy Workshops, 214–228. DOI: 10.1109/SPW.2014.38.
  • Oravec, J. A. 2018. “Digital (or Virtual) Hoarding: Emerging Implications of Digital Hoarding for Computing, Psychology, and Organization Science.” International Journal of Computers in Clinical Practice (IJCCP) 3 (1): 27–39. doi:10.4018/IJCCP.2018010103
  • Park, Y. J., and D. D. Shin. 2020. “Contextualizing Privacy on Health-Related use of Information Technology.” Computers in Human Behavior 105: 106204. doi:10.1016/j.chb.2019.106204
  • Sedera, D., and S. Lokuge. 2018. “Is Digital Hoarding a Mental Disorder? Development of a Construct for Digital Hoarding for Future IS Research.” ECIS 2018, pp. 1–1. Association for Information Systems.
  • Shropshire, J., M. Warkentin, A. Johnston, and M. Schmidt. 2006. “Personality and IT Security: An Application of the Five-Factor Model.” AMCIS proceedings, 415.
  • Siponen, M., M. Mahmood, and S. Pahnila. 2013. “Employees’ Adherence to Information Security Policies: An Exploratory Field Study.” Information & Management 51, 217–224. doi:10.1016/j.im.2013.08.006.
  • Spain, S. M., P. Harms, and J. M. LeBreton. 2014. “The Dark Side of Personality at Work.” Journal of Organizational Behavior 35 (S1): S41–S60. doi:10.1002/job.1894
  • Sweeten, G., E. Sillence, and N. Neave. 2018. “Digital Hoarding Behaviours: Underlying Motivations and Potential Negative Consequences.” Computers in Human Behavior 85: 54–60. doi:10.1016/j.chb.2018.03.031
  • Uğur, N. G., and K. Çalışkan. 2022. “Time for De-Cluttering: Digital Clutter Scaling for Individuals and Enterprises.” Computers & Security, 119: 102751. doi:10.1016/j.cose.2022.102751
  • Van Bennekom, M. J., R. M. Blom, N. Vulink, and D. Denys. 2015. “Case Report: A Case of Digital Hoarding.” BMJ Case Reports 2015. doi:bcr2015210814.
  • Vitale, F. I., Janzen, and J. McGrenere. 2018, April. “Hoarding and Minimalism: Tendencies in Digital Data Preservation.” Proceedings of the 2018 CHI conference on human factors in computing systems, p. 587. ACM.
  • Vitale, F., W. Odom, and J. McGrenere. 2019, June. “Keeping and Discarding Personal Data: Exploring a Design Space.” Proceedings of the 2019 on designing interactive systems conference, pp. 1463–1477.